The sending of a phony email that pretends to be from a credit-card company or back, luring you to a website that attempts to obtain confidential information from you, is called
A. spoofing
B. phishing
C. spamming
D. key logging
E. cookies
Answer: B. phishing
You might also like to view...
What did the Jdbgmgr hoax ask users to do?
a. Install the jdbgmgr file on their systems. b. Delete the jdbgmgr file from their systems. c. Warned users not sent their taxes online because it's now safe. d. Warned users that the virus will damage their hardware.
Case-based Critical Thinking QuestionsCase 14-1Betty Trooper owns and operates a realty company. She has provided you with properties.xml, which is a file that contains a list of properties enrolled in the multiple listing database. She has created three different versions of a schema for the properties vocabulary and needs help in choosing the most appropriate schema design for her needs. As an example of a schema code:what is the name of the Russian Doll schema document?_______
A. I8900-041 B. studentsrd.xsd C. studentsfc.xsd D. PSAT-080-5
Field X is functionally dependent on field Y if the value of field X depends on the value of field Y.
Answer the following statement true (T) or false (F)
Sara, a forensic invest gator, believes that the system image she was presented with is not the same as the original source. Which of the following should be done to verify whether or not the image has been tampered with?
A. Compare file sizes from the original with the system image. B. Reimage the original source with a read-only tool set to ignore errors. C. Compare hashes of the original source and system image. D. Compare time stamps from the original with the system image.